1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
german
3 years ago
7

You received an email from someone who claims to be a representative from your school. The email asked you to click on a link to

reset your password. You should process with caution because the email may be a ​
Computers and Technology
1 answer:
Sergeeva-Olga [200]3 years ago
6 0

Answer:

Phishing

Explanation:

Phishing = Link to a site, usually a fake replica of a legitimate site but with added implements that can be used to spy on you (how people become victims of identity theft

You might be interested in
The part of the computer that contains the brain, or the central processing unit, also knows as the
Kamila [148]
What other name are you looking for? or pleases rephrase the question, You already have the answer in your question.




The part of the computer that contains the brain is the CPU, or Motherboard, Microprocessor. if that's what you're asking. I don't know another word for the brain of the computer.




Hope that helps!!!
7 0
3 years ago
1. Name the three kinds of Eraser in Photoshop. <br>​
antiseptic1488 [7]

Answer:

the Eraser, Background Eraser, and Magic Eraser.

Explanation:

the Eraser, Background Eraser, and Magic Eraser.

5 0
2 years ago
Read 2 more answers
A developer writes a trigger on the Account object on the before update event that increments a count field. A workflow rule als
Andreyy89

Answer:

The answer is "2"

Explanation:

In the given question, the answer is "2" because if the user is new. so very first, the user creates its account and after creating his account, he will update his account value.

When the user creates its account, the value will be 1, and when he updates its account value. so, the value will be 2, that's why 2 is the correct answer.

4 0
4 years ago
What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t
snow_tiger [21]
The recommended secure protocol for voice and video applications is the Secure<span> Real-time Transport </span>Protocol<span> (SRTP) protocol. SRTP is a Real-time Transport </span>Protocol (RTP) profile used to  to provide encryption, message authentication and integrity.
The default cipher of SRTP is the Advanced Encryption Standard<span> (AES) .</span>
8 0
4 years ago
I need help with this problem please
alina1380 [7]

Answer:

i think its d

8 0
3 years ago
Other questions:
  • There are n tasks to complete. Each task first needs to be preprocessed on a supercomputer and then finished on one of n process
    12·1 answer
  • The Circle of Growth
    10·1 answer
  • This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while
    8·1 answer
  • A database interrogation is a major benefit of the database management approach, where end users can query (“ask”) the database
    6·1 answer
  • Audiovisual means that a presentation combines film and photos.<br> true or false?
    6·2 answers
  • What values can represent a bit
    8·1 answer
  • Explain any two features of a computer​
    15·1 answer
  • Complete main() to read dates from input, one date per line. Each date's format must be as follows: March 1, 1990. Any date not
    10·1 answer
  • If C2=20 and D2=10 what is the result of the function = mathcal I F(C2=D2,^ prime prime Ful "Open")?
    11·1 answer
  • The ________ function will change a character argument from lowercase to uppercase. isupper toupper tolarge fromlower none of th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!